期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Hijacked Planes Destroy Twin Towers, Burn Pentagon
1
作者 Alan Elsner Arthur Spiegelman 窦宇 《当代外语研究》 2001年第10期9-13,共5页
美国东部时间2001年9月11日上午9时(北京时间9月11日21时)以后,美国纽约和华盛顿的主要建筑接连遭到恐怖主义分子袭击。下文是事件发生后9小时的报道。
关键词 Burn Pentagon hijacked Planes Destroy Twin Towers 华盛顿 内布拉斯加州
原文传递
History Hijacked
2
作者 秋子 《当代外语研究》 1996年第2期6-8,5,共4页
去年是纪念世界反法西斯战争胜利50周年。美国《时代》周刊于去年2月13日发表了Charles Krauthammer撰写的History Hijacked一文,引起较大反响。文章从美国史密森学会为纪念广岛原子弹爆炸50周年展览被取消事件谈起,批评了美国国内一些... 去年是纪念世界反法西斯战争胜利50周年。美国《时代》周刊于去年2月13日发表了Charles Krauthammer撰写的History Hijacked一文,引起较大反响。文章从美国史密森学会为纪念广岛原子弹爆炸50周年展览被取消事件谈起,批评了美国国内一些人所持的历史修正主义观点以及国家文化机构为他们提供讲台的错误做法。文章同时也提到美国国会内部革新派与保守派在此问题上的分歧与妥协。作者对革新派的软弱表示了不满,指出政府必须毫不妥协地制止这种文化机构的堕落现象。 南京大屠杀事件、德国大批屠杀犹太人事件过去50周年了,当我们回顾历史时,仍有一些人在不顾事实肆意歪曲历史。History Hijacked一文无疑在某种程度上提醒人们:我们应当给历史以起码的尊重和客观公正的评价;政府在这一方面应起到积极而不是相反的作用。 展开更多
关键词 史密森学会 广岛原子弹 History hijacked
原文传递
hijack(劫机)的由来
3
作者 李德信 《语言教育》 2002年第2期34-34,共1页
2001年9月11日恐怖主义者劫持美国民航客机,袭击了世贸中心和国防部五角大楼。“9.11”事件举世震惊,hijack(劫机)一词也随之而家喻户晓。
关键词 举世震惊 民航客机 世贸中心 HIJACK 劫机事件 美国宪法 跳出来 呼语 acker
在线阅读 下载PDF
Terrorist Networks, Network Energy and Node Removal: A New Measure of Centrality Based on Laplacian Energy 被引量:18
4
作者 Xingqin Qi Robert D. Duval +6 位作者 Kyle Christensen Edgar Fuller Arian Spahiu Qin Wu Yezhou Wu Wenliang Tang Cunquan Zhang 《Social Networking》 2013年第1期19-31,共13页
In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrali... In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrality) of a vertex is related to the ability of the network to respond to the deactivation or removal of that vertex from the network. In particular, the Laplacian centrality of a vertex is defined as the relative drop of Laplacian energy caused by the deactivation of this vertex. The Laplacian energy of network G with?n?vertices is defined as , where ?is the eigenvalue of the Laplacian matrix of G. Other dynamics based measures such as that of Masuda and Kori and PageRank compute the importance of a node by analyzing the way paths pass through a node while our measure captures this information as well as the way these paths are “redistributed” when the node is deleted. The validity and robustness of this new measure are illustrated on two different terrorist social network data sets and 84 networks in James Moody’s Add Health in school friendship nomination data, and is compared with other standard centrality measures. 展开更多
关键词 NETWORK CENTRALITY LAPLACIAN ENERGY 9/11 HIJACKING Bali BOMBING Terrorism
在线阅读 下载PDF
High-Risk LEO Satellite Network Path Detection Based on Spatial and Temporal Delay Anomaly Analysis 被引量:3
5
作者 Tianyu Zhang Hewu Li +5 位作者 Jun Liu Lu Lu Qian Wu Shaowen Zheng Zeqi Lai Yuanjie Li 《China Communications》 SCIE CSCD 2023年第7期57-71,共15页
The gradual deployment of Low-Earth Orbit(LEO)mega constellations with inter-satellite links(ISLs)promises ubiquitous,low-latency,and high-throughput satellite network services.However,networked LEO satellites with IS... The gradual deployment of Low-Earth Orbit(LEO)mega constellations with inter-satellite links(ISLs)promises ubiquitous,low-latency,and high-throughput satellite network services.However,networked LEO satellites with ISLs are also at risk of routing attacks such as hijacking.Existing defenses against route hijacking in terrestrial networks can hardly work for the LEO satellite network due to its high spatiotemporal dynamics.To deal with it,we propose RPD,a high-risk routing path detection method for LEO mega-constellation networks.RPD detects abnormal high-risk LEO network paths by checking the consistency between the path delay and the geographical distance.This is efficiently achieved by combining in-band measurements and out-of-band statistical processing to detect the anomaly of the clustering feature in the reference delay matrix.RPD avoids the recalculation of the header cryptographic marks when the handover occurs,thus greatly reducing the cost and improving the performance of highrisk path detection.Experiments showed that the proposed RPD mechanism achieves an average detection accuracy of 91.64%under normal network conditions,and maintain about 89%even when congestion occurs in multiple areas of the network and measurement noise is considered.In addition,RPD does not require any cryptographic operation on the intermediate node,only minimal communication cost with excellent scalability and deployability. 展开更多
关键词 LEO satellite networks route hijacking path verification risky path detection
在线阅读 下载PDF
Towards Blockchain-Based Secure BGP Routing,Challenges and Future Research Directions 被引量:2
6
作者 Qiong Yang Li Ma +3 位作者 Shanshan Tu Sami Ullah MuhammadWaqas Hisham Alasmary 《Computers, Materials & Continua》 SCIE EI 2024年第5期2035-2062,共28页
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits s... Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security threats.Meanwhile,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of trust.The decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing mechanisms.In this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their causes.Additionally,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security threats.Finally,we discuss the challenges posed by BGP security problems and outline prospects for future research. 展开更多
关键词 BGP security blockchain prefix hijacking trust model secure routing
在线阅读 下载PDF
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
7
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN)
原文传递
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems 被引量:1
8
作者 Stephen Brako Oti James Ben Hayfron-Acquah 《Journal of Computer and Communications》 2014年第8期10-21,共12页
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to sessio... The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to session hijacking attacks. There are a number of proposals aimed at improving BGP security which have not been fully implemented. This paper examines a number of approaches for securing BGP through a comparative study and identifies the reasons why these proposals have not been implemented commercially. This paper analyses the architecture of internet routing and the design of BGP while focusing on the problem of BGP session hijacking attacks. Using Graphical Network Simulator 3 (GNS-3), a session hijack is demonstrated and a solution which involves the implementation of route filtering, policy-maps and route-maps on CISCO routers representing ASes is carried out. In the end, a workable industry standard framework for securing and protecting BGP sessions and border routers from exploitation with little or no modification to the existing routing infrastructure is demonstrated. 展开更多
关键词 Inter-Domain ROUTING SESSION HIJACKING BGP SECURITY Autonomous Systems
在线阅读 下载PDF
我国TEMPEST发展亟待解决的问题与对策 被引量:4
9
作者 胡延军 孙德刚 杜虹 《信息安全与通信保密》 2003年第6期18-21,共4页
本文从TEMPEST技术基础研究、检测、防护、产品结构四个方面对其发展中亟待解决的问题与对策进行了深入探讨。
关键词 中国 TEMPEST技术 信息安全 HIJACK NONSTOP SOFT—TEMPEST 电磁波 电磁泄漏 声光 安全隔离交换系统 技术管理 防护产品
原文传递
A Customized Authentication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs
10
作者 Mubashir Hussain Hui Guo Sri Parameswaran 《Journal of Computer and Communications》 2018年第1期135-152,共18页
Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be ... Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be unleashed in a NoC (Network on Chip) based system where the NoC comes from a third-party vendor and can be engrafted with hardware Trojans. Unlike the attackers on a traditional network, those Trojans are usually small and have limited capacity. This paper targets such a hardware Trojan;Specifically, the Trojan aims to divert traffic packets to unauthorized locations on the NoC. To detect this kind of traffic hijacking, we propose an authentication scheme in which the source and destination addresses are tagged. We develop a custom design for the packet tagging and authentication such that the implementation costs can be greatly reduced. Our experiments on a set of applications show that on average the detection circuitry incurs about 3.37% overhead in area, 2.61% in power, and 0.097% in performance when compared to the baseline design. 展开更多
关键词 Packet HIJACKING DETECTION HARDWARE TROJAN NETWORK-ON-CHIP
在线阅读 下载PDF
Audio Hijack Pro万能录音机
11
《数字技术与应用》 2004年第12期46-46,共1页
Audio Hijack Pro是由Rogue amoeba开发的音频软件,它的功能非常强大只要是你的Mac能放的声音。这个程序都可以录下来.从流媒体广播到DVD音频.还可以为任何程序作数字声效处理,可以使iTunes和Quicktime电台效果明显改善。
关键词 Rogue amoeba公司 音频软件 AUDIO HIJACK PRO 功能
在线阅读 下载PDF
英语类比构词趣谈
12
作者 张红朝 《魅力中国》 2010年第31期73-73,共1页
类比构词(Wora—Formation by Analogy)是英语中一种有趣而又实用的构词方式。其构词特点是,以某个同类词为模式,在语义上进行联想类比,替换其中某个词素,构造出与之对应或类似的新词来。例如,workaholic(工作迷)系仿alco—ho... 类比构词(Wora—Formation by Analogy)是英语中一种有趣而又实用的构词方式。其构词特点是,以某个同类词为模式,在语义上进行联想类比,替换其中某个词素,构造出与之对应或类似的新词来。例如,workaholic(工作迷)系仿alco—holic(嗜酒者)而造,而seajack(海上劫持)和skyjack(空中劫持)则是类比hijack(拦路抢劫)而成,故都属类比词。 展开更多
关键词 类比构词 英语 HIJACK 构词方式 构词特点 联想类比 类比词 语义
在线阅读 下载PDF
英语词语探源
13
作者 王春 《中学生英语(初中版)》 2003年第12期10-10,共1页
1 ACHILLE’S HEEL 这个短话来源于古希腊神话。Achille是古希腊传说中的一位杰出英雄,他在特洛伊战争中身经百战,屡建功勋。据说,Achille出生时也只是一个极其普通的孩子。他的母亲为了锻炼他坚强的意志,造就他一副刀枪不入的钢铁之躯... 1 ACHILLE’S HEEL 这个短话来源于古希腊神话。Achille是古希腊传说中的一位杰出英雄,他在特洛伊战争中身经百战,屡建功勋。据说,Achille出生时也只是一个极其普通的孩子。他的母亲为了锻炼他坚强的意志,造就他一副刀枪不入的钢铁之躯,便倒提着他的身体放到环绕地狱的河——冥河中去浸泡。果然,经过浸泡。 展开更多
关键词 英语 “S.0.S.” 词汇 词源 初中 HIJACK 词义
在线阅读 下载PDF
可升级的网络攻击检测问题的研究(英文)
14
作者 Cui Wei Zhang Qishan 《科技经济市场》 2006年第2期65-66,共2页
关键词 Network Intrusion Detection Communication Complexity TCP Connection Hijacking
在线阅读 下载PDF
Decoding the senses:A new player in plant–virus dynamics unveiled
15
作者 Marco Aurelio Ferreira Fredy D.A.Silva +1 位作者 Pedro A.B.Reis Elizabeth P.B.Fontes 《Molecular Plant》 2025年第6期934-937,共4页
Viruses typically have small genomes with limited coding capacity and must,therefore,rely intensively on the host’s cellular machinery to complete their life cycles.Plant viruses are no exception.To establish a succe... Viruses typically have small genomes with limited coding capacity and must,therefore,rely intensively on the host’s cellular machinery to complete their life cycles.Plant viruses are no exception.To establish a successful infection,they must hijack host functions to support transcription,replication,intra-and intercellular movement,and encapsidation of the viral genome,all while evading host immune defenses. 展开更多
关键词 hijack host functions transcription host immune defenses HOST cellular machinery PLANT infection replication
原文传递
AB-DHD:An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery
16
作者 Xiao Chen Le-Tian Sha +2 位作者 Fu Xiao Jia-Ye Pan Jian-Kuo Dong 《Journal of Computer Science & Technology》 2025年第3期887-903,共17页
With the rapid development of operating systems,attacks on system vulnerabilities are increasing.Dynamic link library(DLL)hijacking is prevalent in installers on freeware platforms and is highly susceptible to exploit... With the rapid development of operating systems,attacks on system vulnerabilities are increasing.Dynamic link library(DLL)hijacking is prevalent in installers on freeware platforms and is highly susceptible to exploitation by malware attackers.However,existing studies are based solely on the load paths of DLLs,ignoring the attributes of installers and invocation modes,resulting in low accuracy and weak generality of vulnerability detection.In this paper,we propose a novel model,AB-DHD,which is based on an attention mechanism and a bi-directional gated recurrent unit(BiGRU)neural network for DLL hijacking vulnerability discovery.While BiGRU is an enhancement of GRU and has been widely applied in sequence data processing,a double-layer BiGRU network is introduced to analyze the internal features of installers with DLL hijacking vulnerabilities.Additionally,an attention mechanism is incorporated to dynamically adjust feature weights,significantly enhancing the ability of our model to detect vulnerabilities in new installers.A comprehensive“List of Easily Hijacked DLLs”is developed to serve a reference for future studies.We construct an EXEFul dataset and a DLLVul dataset,using data from two publicly available authoritative vulnerability databases,Common Vulnerabilities&Exposures(CVE)and China National Vulnerability Database(CNVD),and mainstream installer distribution platforms.Experimental results show that our model outperforms popular automated tools like Rattler and DLLHSC,achieving an accuracy of 97.79%and a recall of 94.72%.Moreover,17 previously unknown vulnerabilities have been identified,and corresponding vulnerability certifications have been assigned. 展开更多
关键词 attention mechanism dynamic link library hijacking gated recurrent unit(GRU) operating system vulnerability discovery
原文传递
Evolution of CYP71D drives the diversification of monoterpene indole alkaloid biosynthesis in Gentianales
17
作者 Sébastien Besseau Mickael Durand +12 位作者 Duchesse-Lacours Zamar Enzo Lezin Louis-Valentin Méteignier Caroline Birer Williams Christelle Dutilleul Thomas Perrot Arnaud Lanoue Audrey Oudin Nicolas Papon Georges Massiot Chao Sun Benoit St-Pierre Vincent Courdavault 《Plant Communications》 2025年第8期16-20,共5页
Dear Editor,Although primary metabolism is assumed to be highly evolutionarily conserved in plants,specialized metabolism is more prone to active diversification to allow adaptation to changing environments.Notably,th... Dear Editor,Although primary metabolism is assumed to be highly evolutionarily conserved in plants,specialized metabolism is more prone to active diversification to allow adaptation to changing environments.Notably,this diversification results from core metabolic enzyme hijacking or gene duplication events that are highly prevalent in plants,as observed for cytochrome P450s. 展开更多
关键词 gene duplication events cytochrome p s active diversification monoterpene indole alkaloid biosynthesis CYP D Gentianales EVOLUTION core metabolic enzyme hijacking
原文传递
格式化字符串漏洞原理的研究
18
作者 龙恒 《网络安全技术与应用》 2024年第6期55-59,共5页
本文基于x86架构处理器和64位版本的Linux操作系统组成的平台,使用对两个有漏洞的程序进行渗透测试的方法对格式化字符串漏洞的原理进行了分析。首先介绍了格式化字符串漏洞产生的原因;随后以两种常见的攻击方式为例,讲解了利用格式化... 本文基于x86架构处理器和64位版本的Linux操作系统组成的平台,使用对两个有漏洞的程序进行渗透测试的方法对格式化字符串漏洞的原理进行了分析。首先介绍了格式化字符串漏洞产生的原因;随后以两种常见的攻击方式为例,讲解了利用格式化字符串漏洞进行攻击的原理,介绍了格式化字符串函数参数位置的确定方法,给出了生成攻击载荷的算法以及栈和进程地址的计算方法,分析了编程方式的不同以及使用不同安全机制对渗透测试过程的影响;最后介绍了格式化字符串的漏洞的防范方法。 展开更多
关键词 格式化字符串漏洞 渗透测试 Return-into-libc攻击 hijack GOT攻击
原文传递
Communication-Based Attacks Detection in Android Applications 被引量:2
19
作者 Chuan Ma Tao Wang +3 位作者 Limin Shen Dongkui Liang Shuping Chen Dianlong You 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期596-614,共19页
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method is proposed to model and detect inter-component communication behavior in Android applications. Firstly,we generate data flow graphs and data facts for each component through component-level data flow analysis.Secondly, our approach treats ICC just like method calls. After analyzing the fields and data dependencies of the intent, we identify the ICC caller and callee, track the data flow between them, and construct the ICC model. Thirdly,the behavior model of Android applications is constructed by a formal mapping method for component data flow graph based on Pi calculus. The runtime sensitive path trigger detection algorithm is then given. Communicationbased attacks are detected by analyzing intent abnormity. Finally, we analyze the modeling and detection efficiency,and compare it with relevant methods. Analysis of 57 real-world applications partly verifies the effectiveness of the proposed method. 展开更多
关键词 ANDROID inter-component COMMUNICATION intents COMPONENT HIJACKING attack DETECTION
原文传递
VenomAttack: automated and adaptive activity hijacking in Android
20
作者 Pu SUN Sen CHEN +3 位作者 Lingling FAN Pengfei GAO Fu SONG Min YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第1期187-204,共18页
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose secu... Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose security threats in recent Android due to the presence of effective defense mechanisms. In this work, we propose the first automated and adaptive activity hijacking attack, named VenomAttack, enabling a spectrum of customized attacks (e.g., phishing, spoofing, and DoS) on a large scale in recent Android, even the state-of-the-art defense mechanisms are deployed. Specifically, we propose to use hotpatch techniques to identify vulnerable devices and update attack payload without re-installation and re-distribution, hence bypassing offline detection. We present a newly-discovered flaw in Android and a bug in derivatives of Android, each of which allows us to check if a target app is running in the background or not, by which we can determine the right attack timing via a designed transparent activity. We also propose an automated fake activity generation approach, allowing large-scale attacks. Requiring only the common permission INTERNET, we can hijack activities at the right timing without destroying the GUI integrity of the foreground app. We conduct proof-of-concept attacks, showing that VenomAttack poses severe security risks on recent Android versions. The user study demonstrates the effectiveness of VenomAttack in real-world scenarios, achieving a high success rate (95%) without users’ awareness. That would call more attention to the stakeholders like Google. 展开更多
关键词 ANDROID activity hijacking Android security mobile security
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部